Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 80.139.1.173
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7799
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;80.139.1.173.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 04:45:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
173.1.139.80.in-addr.arpa domain name pointer p508b01ad.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
173.1.139.80.in-addr.arpa	name = p508b01ad.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
221.132.17.81 attack
--- report ---
Dec 14 05:36:00 sshd: Connection from 221.132.17.81 port 45724
Dec 14 05:36:01 sshd: Invalid user marty from 221.132.17.81
Dec 14 05:36:01 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.81
Dec 14 05:36:03 sshd: Failed password for invalid user marty from 221.132.17.81 port 45724 ssh2
Dec 14 05:36:03 sshd: Received disconnect from 221.132.17.81: 11: Bye Bye [preauth]
2019-12-14 20:55:42
37.59.107.100 attackbotsspam
Invalid user oeflein from 37.59.107.100 port 45568
2019-12-14 21:05:49
196.192.110.67 attack
Dec 14 12:38:07 wh01 sshd[4218]: Invalid user cactiuser from 196.192.110.67 port 48152
Dec 14 12:38:07 wh01 sshd[4218]: Failed password for invalid user cactiuser from 196.192.110.67 port 48152 ssh2
Dec 14 12:38:07 wh01 sshd[4218]: Received disconnect from 196.192.110.67 port 48152:11: Bye Bye [preauth]
Dec 14 12:38:07 wh01 sshd[4218]: Disconnected from 196.192.110.67 port 48152 [preauth]
Dec 14 12:46:54 wh01 sshd[5040]: Failed password for root from 196.192.110.67 port 47250 ssh2
Dec 14 12:46:54 wh01 sshd[5040]: Received disconnect from 196.192.110.67 port 47250:11: Bye Bye [preauth]
Dec 14 12:46:54 wh01 sshd[5040]: Disconnected from 196.192.110.67 port 47250 [preauth]
2019-12-14 20:34:00
77.42.93.15 attackbots
port scan and connect, tcp 23 (telnet)
2019-12-14 21:08:07
37.193.108.101 attackbots
Invalid user foutch from 37.193.108.101 port 15080
2019-12-14 20:31:27
223.71.167.155 attackbots
Dec 14 13:26:01 debian-2gb-nbg1-2 kernel: \[24607888.944980\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=223.71.167.155 DST=195.201.40.59 LEN=44 TOS=0x04 PREC=0x00 TTL=114 ID=22124 PROTO=TCP SPT=45186 DPT=8883 WINDOW=29200 RES=0x00 SYN URGP=0
2019-12-14 20:55:19
185.176.27.254 attackspambots
12/14/2019-07:42:19.605947 185.176.27.254 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-14 20:52:11
106.12.137.55 attackbotsspam
Dec 14 07:58:33 [host] sshd[7069]: Invalid user viriya from 106.12.137.55
Dec 14 07:58:33 [host] sshd[7069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.137.55
Dec 14 07:58:36 [host] sshd[7069]: Failed password for invalid user viriya from 106.12.137.55 port 37250 ssh2
2019-12-14 20:54:00
159.65.109.148 attackbotsspam
2019-12-14T12:58:37.386065shield sshd\[26839\]: Invalid user revolution from 159.65.109.148 port 41112
2019-12-14T12:58:37.390190shield sshd\[26839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.109.148
2019-12-14T12:58:39.256973shield sshd\[26839\]: Failed password for invalid user revolution from 159.65.109.148 port 41112 ssh2
2019-12-14T13:04:23.665601shield sshd\[28024\]: Invalid user asm from 159.65.109.148 port 48162
2019-12-14T13:04:23.670198shield sshd\[28024\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.109.148
2019-12-14 21:06:37
200.248.74.178 attack
Dec 14 08:34:18 icinga sshd[52588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.248.74.178 
Dec 14 08:34:19 icinga sshd[52588]: Failed password for invalid user manigill from 200.248.74.178 port 38309 ssh2
Dec 14 08:54:24 icinga sshd[5975]: Failed password for root from 200.248.74.178 port 44804 ssh2
...
2019-12-14 21:08:22
203.230.6.175 attackspambots
Dec 14 12:50:41 ArkNodeAT sshd\[5122\]: Invalid user zikri from 203.230.6.175
Dec 14 12:50:41 ArkNodeAT sshd\[5122\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.230.6.175
Dec 14 12:50:43 ArkNodeAT sshd\[5122\]: Failed password for invalid user zikri from 203.230.6.175 port 50468 ssh2
2019-12-14 20:27:26
124.156.64.176 attackbots
Dec 14 09:23:25 debian-2gb-vpn-nbg1-1 kernel: [682981.184651] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=124.156.64.176 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=54321 PROTO=TCP SPT=59861 DPT=995 WINDOW=65535 RES=0x00 SYN URGP=0
2019-12-14 20:50:21
2a0c:9f00::f292:1cff:fe0c:e4c8 attackspambots
21 attempts against mh-misbehave-ban on hill.magehost.pro
2019-12-14 20:53:07
178.128.208.219 attack
Dec 14 12:57:05 server sshd\[16793\]: Invalid user pou from 178.128.208.219
Dec 14 12:57:05 server sshd\[16793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.208.219 
Dec 14 12:57:07 server sshd\[16793\]: Failed password for invalid user pou from 178.128.208.219 port 60994 ssh2
Dec 14 13:04:00 server sshd\[18718\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.208.219  user=root
Dec 14 13:04:02 server sshd\[18718\]: Failed password for root from 178.128.208.219 port 48752 ssh2
...
2019-12-14 20:32:59
94.54.75.44 attack
1576304616 - 12/14/2019 07:23:36 Host: 94.54.75.44/94.54.75.44 Port: 445 TCP Blocked
2019-12-14 20:41:07

Recently Reported IPs

28.71.223.56 28.247.25.187 234.239.126.129 73.242.59.34
18.165.114.142 118.56.188.19 127.158.159.246 32.254.38.156
57.134.17.156 79.238.132.95 50.30.4.118 198.195.54.139
174.160.3.197 168.175.168.71 141.51.121.174 236.53.36.208
240.135.153.4 50.205.148.108 143.39.207.176 78.49.71.86